More

    Exploits

    Malicious VS Code Extensions Linked to TigerJack Breach Developer Marketplaces

    A sophisticated new malware campaign has targeted the global developer community, with the threat actor known as TigerJack infiltrating multiple extension marketplaces to deploy malicious Visual...

    Capita given record £14 million fine over ransomware attack security failings

    Capita, the United Kingdom’s largest outsourcing company, was on Wednesday fined £14 million ($18.7 million) over security failings that saw attackers compromise the...

    Maltrail: Open-source malicious traffic detection system

    Maltrail is an open-source network traffic detection system designed to spot malicious or suspicious activity. It works by checking traffic against publicly available blacklists,...

    The 8 Most Dangerous File Types for Malware Infections

    The 8 Most Dangerous File Types for Malware Infections October 14, 2025 Every file your organization touches is a potential threat in disguise. Behind the spreadsheets,...

    MonsterV2 malware spread through ClickFix campaigns

    The new TA585 threat group abuses compromised websites and GitHub issues to spread malware. 

    Scattered Lapsus$ Hunters extortion site goes dark: What’s next?

    Group leaks data stolen from small subset of the 39 companies it threatened last week. 

    PolarEdge With Custom TLS Server Uses Custom Binary Protocol for C2 Communication

    PolarEdge IoT backdoor uses custom TLS server and binary protocol for C2, exploiting Cisco CVE-2023-20118 for remote access. 

    The ‘Pixnapping’ Attack Can Steal Your 2FA Codes

    Did you know you can customize Google to filter out garbage? Take these steps for better search results, including adding my work at Lifehacker...

    Hackers Leverage Judicial Notifications to Deploy Info-Stealer Malware

    Cybercriminals target Colombian users with fake court emails delivering AsyncRAT via multi-stage malware disguised as legal notices. 

    Latest articles